1/* LibTomCrypt, modular cryptographic library -- Tom St Denis 2 * 3 * LibTomCrypt is a library that provides various cryptographic 4 * algorithms in a highly modular and flexible manner. 5 * 6 * The library is free for all purposes without any express 7 * guarantee it works. 8 * 9 * Tom St Denis, tomstdenis@gmail.com, http://libtomcrypt.com 10 */ 11/** 12 @param sha384.c 13 SHA384 hash included in sha512.c, Tom St Denis 14*/ 15 16const struct ltc_hash_descriptor sha384_desc = 17{ 18 "sha384", 19 4, 20 48, 21 128, 22 23 /* OID */ 24 { 2, 16, 840, 1, 101, 3, 4, 2, 2, }, 25 9, 26 27 &sha384_init, 28 &sha512_process, 29 &sha384_done, 30 &sha384_test, 31 NULL 32}; 33 34/** 35 Initialize the hash state 36 @param md The hash state you wish to initialize 37 @return CRYPT_OK if successful 38*/ 39int sha384_init(hash_state * md) 40{ 41 LTC_ARGCHK(md != NULL); 42 43 md->sha512.curlen = 0; 44 md->sha512.length = 0; 45 md->sha512.state[0] = CONST64(0xcbbb9d5dc1059ed8); 46 md->sha512.state[1] = CONST64(0x629a292a367cd507); 47 md->sha512.state[2] = CONST64(0x9159015a3070dd17); 48 md->sha512.state[3] = CONST64(0x152fecd8f70e5939); 49 md->sha512.state[4] = CONST64(0x67332667ffc00b31); 50 md->sha512.state[5] = CONST64(0x8eb44a8768581511); 51 md->sha512.state[6] = CONST64(0xdb0c2e0d64f98fa7); 52 md->sha512.state[7] = CONST64(0x47b5481dbefa4fa4); 53 return CRYPT_OK; 54} 55 56/** 57 Terminate the hash to get the digest 58 @param md The hash state 59 @param out [out] The destination of the hash (48 bytes) 60 @return CRYPT_OK if successful 61*/ 62int sha384_done(hash_state * md, unsigned char *out) 63{ 64 unsigned char buf[64]; 65 66 LTC_ARGCHK(md != NULL); 67 LTC_ARGCHK(out != NULL); 68 69 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { 70 return CRYPT_INVALID_ARG; 71 } 72 73 sha512_done(md, buf); 74 XMEMCPY(out, buf, 48); 75#ifdef LTC_CLEAN_STACK 76 zeromem(buf, sizeof(buf)); 77#endif 78 return CRYPT_OK; 79} 80 81/** 82 Self-test the hash 83 @return CRYPT_OK if successful, CRYPT_NOP if self-tests have been disabled 84*/ 85int sha384_test(void) 86{ 87 #ifndef LTC_TEST 88 return CRYPT_NOP; 89 #else 90 static const struct { 91 char *msg; 92 unsigned char hash[48]; 93 } tests[] = { 94 { "abc", 95 { 0xcb, 0x00, 0x75, 0x3f, 0x45, 0xa3, 0x5e, 0x8b, 96 0xb5, 0xa0, 0x3d, 0x69, 0x9a, 0xc6, 0x50, 0x07, 97 0x27, 0x2c, 0x32, 0xab, 0x0e, 0xde, 0xd1, 0x63, 98 0x1a, 0x8b, 0x60, 0x5a, 0x43, 0xff, 0x5b, 0xed, 99 0x80, 0x86, 0x07, 0x2b, 0xa1, 0xe7, 0xcc, 0x23, 100 0x58, 0xba, 0xec, 0xa1, 0x34, 0xc8, 0x25, 0xa7 } 101 }, 102 { "abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu", 103 { 0x09, 0x33, 0x0c, 0x33, 0xf7, 0x11, 0x47, 0xe8, 104 0x3d, 0x19, 0x2f, 0xc7, 0x82, 0xcd, 0x1b, 0x47, 105 0x53, 0x11, 0x1b, 0x17, 0x3b, 0x3b, 0x05, 0xd2, 106 0x2f, 0xa0, 0x80, 0x86, 0xe3, 0xb0, 0xf7, 0x12, 107 0xfc, 0xc7, 0xc7, 0x1a, 0x55, 0x7e, 0x2d, 0xb9, 108 0x66, 0xc3, 0xe9, 0xfa, 0x91, 0x74, 0x60, 0x39 } 109 }, 110 }; 111 112 int i; 113 unsigned char tmp[48]; 114 hash_state md; 115 116 for (i = 0; i < (int)(sizeof(tests) / sizeof(tests[0])); i++) { 117 sha384_init(&md); 118 sha384_process(&md, (unsigned char*)tests[i].msg, (unsigned long)strlen(tests[i].msg)); 119 sha384_done(&md, tmp); 120 if (XMEMCMP(tmp, tests[i].hash, 48) != 0) { 121 return CRYPT_FAIL_TESTVECTOR; 122 } 123 } 124 return CRYPT_OK; 125 #endif 126} 127 128 129 130 131 132 133/* $Source: /cvs/libtom/libtomcrypt/src/hashes/sha2/sha384.c,v $ */ 134/* $Revision: 1.8 $ */ 135/* $Date: 2006/11/01 09:28:17 $ */ 136